Skip to main content

Showing 1–8 of 8 results for author: Woodward, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.16993  [pdf

    cs.CE

    Estimating Deprivation Cost Functions for Power Outages During Disasters: A Discrete Choice Modeling Approach

    Authors: Xiangpeng Li, Mona Ahmadiani, Richard Woodward, Bo Li, Arnold Vedlitz, Ali Mostafavi

    Abstract: Systems for the generation and distribution of electrical power represents critical infrastructure and, when extreme weather events disrupt such systems, this imposes substantial costs on consumers. These costs can be conceptualized as deprivation costs, an increasing function of time without service, quantifiable through individuals' willingness to pay for power restoration. Despite widespread re… ▽ More

    Submitted 20 June, 2025; originally announced June 2025.

  2. arXiv:2212.12313  [pdf

    cs.MA

    Analysis of Integrating Blockchain Technologies into Multi-Agent Systems

    Authors: Chelsea R. Woodward

    Abstract: Multi-Agent Systems, a division of Intelligent Systems diversely applied in multiple disciplines. Desired for their efficiency in solving complex problems at a low cost. However, identified vulnerabilities include system security, integrity, and identity management. Blockchain Technologies was chosen for analysis in providing a suitable solution due to features of transparency, encryption, and tru… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

    Comments: 4 pages, 3 figures

  3. arXiv:2202.07764  [pdf, other

    quant-ph cs.CR cs.NI physics.optics

    Paving the Way towards 800 Gbps Quantum-Secured Optical Channel Deployment in Mission-Critical Environments

    Authors: Marco Pistoia, Omar Amer, Monik R. Behera, Joseph A. Dolphin, James F. Dynes, Benny John, Paul A. Haigh, Yasushi Kawakura, David H. Kramer, Jeffrey Lyon, Navid Moazzami, Tulasi D. Movva, Antigoni Polychroniadou, Suresh Shetty, Greg Sysak, Farzam Toudeh-Fallah, Sudhir Upadhyay, Robert I. Woodward, Andrew J. Shields

    Abstract: This article describes experimental research studies conducted towards understanding the implementation aspects of high-capacity quantum-secured optical channels in mission-critical metro-scale operational environments using Quantum Key Distribution (QKD) technology. To the best of our knowledge, this is the first time that an 800 Gbps quantum-secured optical channel -- along with several other De… ▽ More

    Submitted 2 March, 2023; v1 submitted 15 February, 2022; originally announced February 2022.

    Comments: 11 pages, 9 figures, 2 tables

    Journal ref: Quantum Science and Technology, Institute of Physics, May 2023

  4. arXiv:2109.05153  [pdf, other

    cs.CL

    Natural SQL: Making SQL Easier to Infer from Natural Language Specifications

    Authors: Yujian Gan, Xinyun Chen, Jinxia Xie, Matthew Purver, John R. Woodward, John Drake, Qiaofu Zhang

    Abstract: Addressing the mismatch between natural language descriptions and the corresponding SQL queries is a key challenge for text-to-SQL translation. To bridge this gap, we propose an SQL intermediate representation (IR) called Natural SQL (NatSQL). Specifically, NatSQL preserves the core functionalities of SQL, while it simplifies the queries as follows: (1) dispensing with operators and keywords such… ▽ More

    Submitted 10 September, 2021; originally announced September 2021.

    Comments: To appear in EMNLP Findings 2021

  5. arXiv:2106.01065  [pdf, other

    cs.CL

    Towards Robustness of Text-to-SQL Models against Synonym Substitution

    Authors: Yujian Gan, Xinyun Chen, Qiuping Huang, Matthew Purver, John R. Woodward, Jinxia Xie, Pengsheng Huang

    Abstract: Recently, there has been significant progress in studying neural networks to translate text descriptions into SQL queries. Despite achieving good performance on some public benchmarks, existing text-to-SQL models typically rely on the lexical matching between words in natural language (NL) questions and tokens in table schemas, which may render the models vulnerable to attacks that break the schem… ▽ More

    Submitted 19 June, 2021; v1 submitted 2 June, 2021; originally announced June 2021.

    Comments: To appear in ACL 2021

  6. Evolution of Group-Theoretic Cryptology Attacks using Hyper-heuristics

    Authors: Matthew J. Craven, John R. Woodward

    Abstract: In previous work, we developed a single Evolutionary Algorithm (EA) to solve random instances of the Anshel-Anshel-Goldfeld (AAG) key exchange protocol over polycyclic groups. The EA consisted of six simple heuristics which manipulated strings. The present work extends this by exploring the use of hyper-heuristics in group-theoretic cryptology for the first time. Hyper-heuristics are a way to gene… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

    Comments: 16 pages

    MSC Class: 20P05; 68W30; 90C27; 94A60

    Journal ref: Improved version published in the Journal of Mathematical Cryptology 16 (1) (2022), 49-63

  7. arXiv:1711.00909  [pdf, other

    cs.AI

    Weight-Based Variable Ordering in the Context of High-Level Consistencies

    Authors: Robert J. Woodward, Berthe Y. Choueiry

    Abstract: Dom/wdeg is one of the best performing heuristics for dynamic variable ordering in backtrack search [Boussemart et al., 2004]. As originally defined, this heuristic increments the weight of the constraint that causes a domain wipeout (i.e., a dead-end) when enforcing arc consistency during search. "The process of weighting constraints with dom/wdeg is not defined when more than one constraint lead… ▽ More

    Submitted 2 November, 2017; originally announced November 2017.

  8. arXiv:1010.4609  [pdf, other

    cs.AI

    A Partial Taxonomy of Substitutability and Interchangeability

    Authors: Shant Karakashian, Robert Woodward, Berthe Y. Choueiry, Steven Prestwhich, Eugene C. Freuder

    Abstract: Substitutability, interchangeability and related concepts in Constraint Programming were introduced approximately twenty years ago and have given rise to considerable subsequent research. We survey this work, classify, and relate the different concepts, and indicate directions for future work, in particular with respect to making connections with research into symmetry breaking. This paper is a co… ▽ More

    Submitted 22 October, 2010; originally announced October 2010.

    Comments: 18 pages, The 10th International Workshop on Symmetry in Constraint Satisfaction Problems (SymCon'10)